SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

SpecterOps has raised an unusually large $75 million Series B funding round to accelerate the growth of its BloodHound Enterprise platform. 
The post SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform  appeared first on SecurityWee… Continue reading SpecterOps Scores $75M Series B to Scale BloodHound Enterprise Platform 

SailPoint IPO Signals Bright Spot for Cybersecurity

In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets.
The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek.
Continue reading SailPoint IPO Signals Bright Spot for Cybersecurity

CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security

CyberArk acquires early stage Boston startup Zilla Security for $165M, expanding its identity security and IGA capabilities.
The post CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security appeared first on SecurityWeek.
Continue reading CyberArk Expands Identity Security Play with $165M Acquisition of Zilla Security

Clutch Security Raises $20 Million for Non-Human Identity Protection Platform

Clutch Security has raised $20 million in a Series A funding round led by SignalFire to secure non-human identities.
The post Clutch Security Raises $20 Million for Non-Human Identity Protection Platform appeared first on SecurityWeek.
Continue reading Clutch Security Raises $20 Million for Non-Human Identity Protection Platform

Seraphic Attracts $29M Investment to Chase Enterprise Browser Business

Seraphic Security banks $29 million investment as VCs remain bullish on startups with security-themed browsers for corporate defenders.
The post Seraphic Attracts $29M Investment to Chase Enterprise Browser Business appeared first on SecurityWeek.
Continue reading Seraphic Attracts $29M Investment to Chase Enterprise Browser Business

Another category? Why we need ITDR

Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in […]

The post Another category? Why we need ITDR appeared first on Security Intelligence.

Continue reading Another category? Why we need ITDR

Cracking the Cloud: The Persistent Threat of Credential-Based Attacks

Credentials are still the most common entry point for bad actors, even as businesses deploy multi-factor authentication (MFA) to strengthen defenses.
The post Cracking the Cloud: The Persistent Threat of Credential-Based Attacks appeared first on Secur… Continue reading Cracking the Cloud: The Persistent Threat of Credential-Based Attacks